Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Your internet Browser provides information to the visiting site: a. Your IP Addr

ID: 3841657 • Letter: Y

Question

Your internet Browser provides information to the visiting site: a. Your IP Address b. Your screen resolution c. Your facial features d. our operating system e. A, B and D Main security risk control types are a. Avoidance b. Transference c. Mitigation and Acceptance d. All of the above e. None of the above Public and private keys to key digital certificates must use ensure Infrastructure through that users can be trusted a. True b. False Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email? a. Cross-site Scripting b. Cross street fighting. c. Inside tracking d. Java Scripting e. None of the above Ransomware is a sophisticated piece of malware that blocks access to the victims files OS. It is a. Nearly unbreakable b. Encrypts all files c. Displays an image or message to tell you that you have been infected d. All of the above e. None of the above Network entity/host that issues digital certificates of trust verifying certificate holders' legitimacy is known as a. Certificate of Registration b. Certificate of Birth c. Certificate of Ownership d. Certificate Authority

Explanation / Answer

9 E

Browser sends IP and header request to sites

Header request contains User Agent and Cookies

User Agent contains information about OS, browser version and little bit about hardware

Cookies are stored by site for better UI experience.

10 E

Main security risk control types are:-

Preventative

Detective

Corrective

Compensator

11 B

No need of both the keys. Only public key is sufficient

12 A

13 D

14 D